Transcript

3.
CONTENT♦ Overview of Hacking♦ Types of hacking♦ Hacker♦ Types of Hacker♦ Why do hackers hack?♦ How can kid hack?♦ What does a script kid know?♦ Hackers language♦ How to translate the hackers’ language

4.
♦ Ethical Hacking♦ Ethical Hacking – Process♦ What hackers do after hacking?♦ Why can’t defend against hackers?♦ How can protect the system?♦ What should do after hacked?♦ Final words

5.
overview of hacking♦ Hack – Examine something very minutely – the rapid crafting of a new program or the making of changes to existing, usually complicated software♦ Hacker – The person who hacks♦ Cracker – System intruder/destroyer

6.
HACKER♦ Someone who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers♦ Person who is totally immersed in computer technology and programming, and who likes to examine the code of programs to see how they work … then uses his or her computer expertise for illicit purposes such as gaining access to computer systems without permission and tampering with programs and data. At that point, this individual would steal information and install backdoors, virus and Trojans♦ Hacker means cracker nowadays.

7.
Types of hacker♦ White Hat Hackers: – who specializes in penetration testing and in other testing methodologies to ensure the security of an organizations information systems.♦ Black Hat Hackers: – A black hat is the villain or bad guy, especially in a western movie in which such a character would stereotypically wear a black hat in contrast to the heros white hat.♦ Gray Hat Hackers: – A grey hat, in the hacking community, refers to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra

8.
Types of hacker♦ Script Kiddies: – who use scripts or programs developed by others to attack computer systems and networks and deface websites. [♦ Phreak – Person who breaks into telecommunications systems to [commit] theft♦ Cyber Punk – Recent mutation of … the hacker, cracker, and phreak

9.
Why do people hack??♦ To make security stronger ( Ethical Hacking )♦ Just for fun♦ Show off♦ Hack other systems secretly♦ Notify many people their thought♦ Steal important information♦ Destroy enemy’s computer network during the war

10.
How can kid hack?♦ Kid has much of time – Kid can search for longer time than other people♦ All hacking program is easy to use♦ Kid doesn’t have to know how the hacking program works♦ These kids are called script kiddies

12.
What is Ethical Hacking♦ It is Legal♦ Permission is obtained from the target♦ Part of an overall security program♦ Identify vulnerabilities visible from Internet at particular point of time♦ Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner♦ Also Called – Attack & Penetration Testing,

15.
Preparation♦ Identification of Targets – company websites, mail servers, extranets, etc.♦ Signing of Contract – Agreement on protection against any legal issues – Contracts to clearly specifies the limits and dangers of the test – Specifics on Denial of Service Tests, Social Engineering, etc. – Time window for Attacks – Total time for the testing – Prior Knowledge of the systems – Key people who are made aware of the testing

25.
Denial of Service♦ If an attacker is unsuccessful in gaining access, they may use readily available exploit code to disable a target as a last resort♦ Techniques – SYN flood – ICMP techniques – Identical SYN requests – Overlapping fragment/offset bugs – Out of bounds TCP options (OOB) – DDoS

26.
What do hackers do after hacking?♦ Patch security hole – The other hackers can’t intrude♦ Clear logs and hide themselves♦ Install rootkit ( backdoor ) – The hacker who hacked the system can use the system later – It contains trojan virus, and so on♦ Install irc related program – identd, irc, bitchx, eggdrop, bnc

29.
What should do after hacked?♦ Shutdown the system – Or turn off the system♦ Separate the system from network♦ Restore the system with the backup – Or reinstall all programs♦ Connect the system to the network

30.
H4CKING VS CR4CKING♦ HACKING WITH MALICIOUS INTENTION IS CRACKINGThe basic difference is hackers do not do anything disastrous.Cracking yield more devastating results.Cracking is crime.Cyber crime are the results of cracking ,not hacking